Encrypt Data Cloud with Customer-Managed Root Keys
Available in both Salesforce Classic (not available in all orgs) and Lightning Experience. |
Available as an add-on subscription in: Enterprise, Performance, Unlimited, and Developer Editions. Requires purchasing Salesforce Shield or Shield Platform Encryption, and Platform Encryption for Data Cloud. |
User Permissions Needed | |
---|---|
To generate, destroy, export, import, upload, and configure key material: | Manage Encryption Keys |
To view and edit Setup: | View Setup and Configuration |
You can generate root keys that encrypt Data Cloud data in both production and sandbox environments.
- From Setup, in the Quick Find box, enter Encryption Settings, and then select Encryption Settings.
-
Turn on Manage Data Cloud Keys.
Salesforce generates a root key for you. When it’s ready, you can see it on the Key Management page under the Data Cloud tab.
-
Optionally, you can edit the description on your root for easier key identification and
auditing.
- From Setup, in the Quick Find box, enter Encryption Settings, and then select Key Management.
- In the Root Key Inventory section under the Data Cloud tab, click Details.
- Click Edit Description.
- Add a unique description, and then save your work.
The latest root key is your active root key. The active root key is used to secure your data encryption keys in AWS, which are used for encrypt and decrypt operations. You can rotate your Salesforce root key for Data Cloud every 3 months. DEKs are generated in AWS as needed.
Your initial DEK is immediately used to encrypt new data in Data Cloud, including search indexes. Salesforce also applies your DEK to existing data, which can take some time if you have a large amount of data in Data Cloud. Check the status of this process on the Data Cloud card on the Encryption Statistics page in Setup.